General

  • Target

    99a17430ddcc7c922b72786c7d158679b98a380d9d9e8cbccb3bbb040076e222

  • Size

    3.7MB

  • Sample

    241119-3f9asawbqn

  • MD5

    72432f5f8f6efdad1cfa81f64cc67e05

  • SHA1

    28e764862e2df7e07f2cb16cd96f8200c509feaa

  • SHA256

    99a17430ddcc7c922b72786c7d158679b98a380d9d9e8cbccb3bbb040076e222

  • SHA512

    a54b43d8f48b5c16047e33f22e5aea6c737fd2aa02b956629c0cacba5ef63522d9e8114b34911eaf286624bc9510b6083692db8654eebb9ddad24615a78e4f8f

  • SSDEEP

    98304:NcM08KUPOJJtNhn+iYfJm6nXhrfFhFD9dC2:N04PkJvhn+R91DLC2

Malware Config

Targets

    • Target

      99a17430ddcc7c922b72786c7d158679b98a380d9d9e8cbccb3bbb040076e222

    • Size

      3.7MB

    • MD5

      72432f5f8f6efdad1cfa81f64cc67e05

    • SHA1

      28e764862e2df7e07f2cb16cd96f8200c509feaa

    • SHA256

      99a17430ddcc7c922b72786c7d158679b98a380d9d9e8cbccb3bbb040076e222

    • SHA512

      a54b43d8f48b5c16047e33f22e5aea6c737fd2aa02b956629c0cacba5ef63522d9e8114b34911eaf286624bc9510b6083692db8654eebb9ddad24615a78e4f8f

    • SSDEEP

      98304:NcM08KUPOJJtNhn+iYfJm6nXhrfFhFD9dC2:N04PkJvhn+R91DLC2

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks